Total vulnerabilities in the database
The HTTP proxy in Astaro Security Linux 6.0 allows remote attackers to obtain sensitive information via an invalid request, which reveals a Proxy-authorization string in an error message.
Software | From | Fixed in |
---|---|---|
astaro / security_linux | 6.001 | 6.001.x |